Implementing a CMS. First Steps. A Case Study by. Raymond Sneddon, National Australia Group September Version: 1.
|
|
|
- May Jordan
- 10 years ago
- Views:
Transcription
1 Implementing a CMS First Steps A Case Study by, National Australia Group September 2008
2 Introduction...1 Spreadsheet Cells and Brain Cells...1 The Goal...2 Stage 1 Planning...2 Sponsorship...2 The Scope...2 Determining the Detail...2 Management Commitment....2 Product Selection....3 Assign Plenty of Time...3 Stage 2 Implementation...4 Avoid customisation...4 Test and Verify....4 Security...4 Capacity...4 Promotion to Production....5 Expectations...5 Conclusion....6
3 Introduction A Configuration Management System (CMS) is crucial for the successful management of IT services, infrastructure and assets. Without it, important service decisions can and will be flawed. The foundation of any CMS is the accuracy and availability of the source data and maintaining this accuracy and availability can be a difficult and challenging task. Multiple data sources and an ever changing environment contribute greatly to this challenge. The CMS employed by National Australia Group (NAG) did assist the Service Management teams with their day to day decisions. However, the ever increasing complexity of infrastructure and services, a high dependency on people - subject matter experts and manual processes - for the data input and little, if any, integration between various inputs meant that our CMS was, at best, inefficient, at worst, inaccurate. Automating the data collection and maintenance methods in regard to physical device CIs, software CI s and their relationships and holding this data in an appropriate CMDB would improve the efficiency and accuracy of the CMS. Spreadsheet Cells and Brain Cells The Change, Problem and Incident processes rely heavily on information regarding the services they help to support. Details regarding the technology, systems and processes used to support these services and how each relates to one another is crucial in maintaining service levels and continually improving the service. At NAG we held a lot of data in various, disparate data stores - physical CMDBs (spreadsheets databases document stores etc.) and virtual CMDBs, individual subject matter experts with a vast amount of experience and knowledge relating to the various services and technologies. While, in some areas there was a surfeit of information it could prove challenging to integrate the data. The continuous improvement of services added complexity, particularly within environments where the infrastructure was shared among services, and together with the wide spread data sources, it was often difficult to get a coherent and meaningful picture of the various end-to-end business processes, from a technology perspective. The diversity of data sources also resulted in conflict where differences were apparent between data sources, which was the reliable one? The overall result of this - ITIL processes suffered. Incidents could be categorized incorrectly with severity and impact being incorrectly diagnosed. Problems could take longer to resolve due to a lack of understanding of the complete end-to-end service. Incidents due to change were common as risk assessments were inaccurate. Twelve months ago NAG identified that while the processes did protect the services in the main, there were breaches in SLA s that could be eradicated through improving the data available to the CMS and a project to automate the discovery of CIs and integrate CMDBs was instigated. 1
4 The Goal To improve the quality of data provided to the CMS we determined that an accurate inventory of CIs was required. Initially these CIs would be limited to physical devices attached to our network and the software CIs that were hosted on the physical CIs and their relationships to each other. To achieve this, tools would be deployed that would automatically and regularly collect the required CI data. A new CMDB would be built to contain integrated data reconciled from the discovery tools and other data sources as required. This CMDB would hold key CI data, while a federated approach would allow more detailed information to be stored in other databases. This federated data would be accessible from the integrated CMDB giving us our initial goal - the single source of truth. On completion we would have a system on which we could further build enhancements to our CMS and achieve a secondary goal - the foundation for a fully integrated CMS. Stage 1 Planning Sponsorship The need to improve the CMS data was clear and gaining sponsorship was relatively easy. However, satisfying the budget requirements were challenging and compromises had to be negotiated. This had a major impact on what would eventually be the scope of the project. The Scope. Our requirements were to automate the collection of configuration data pertaining to technology components that supported the services that we provided to our business units. However, this in itself was not enough to determine the scope. Determining the consumers of the data and how they would gain access to it was a chief consideration. It was our conscious decision to collect data for the initial purpose of providing an inventory database. The data would be stored in a CMDB whose key requirement was to be able to integrate with existing technologies used to support our CMS. Integrating with other technologies at this stage was out of scope but ensuring that this functionality was available was critical to the future development of the system. Removing this requirement from the original scope allowed the project to quickly proceed. Determining the Detail. The level of detail to be contained within the CMDB was heavily debated. Determining the level of detail required was critical. Too much detail and the database(s) would be large and unmanageable, too little and vital information could be missed. People generally wanted to get as much detail as possible included. As our project made use of multiple data sources, both new and existing, and the initial scope was defined the main challenge was determining if the data was required in the integrated CMDB or if it was detail that could reside in a federated database. Management Commitment. The implementation of automated tools of any kind results in a degree of cultural change. Knocking down the walls of the technology silos can be challenging and without management support, nearly impossible. Ensuring the support of the management teams help promote this project and contributed to its success. 2
5 Product Selection. Several companies were engaged in initial discussion regarding the tools available to achieve our aims. The selection process we used looked at the following Current relationship with vendor Confidence in Professional Services Cost of tools and services Scope of discovery tools o Hardware o OS and application o Network Topology mapping Supports data federation Reporting capabilities Integration into CMS Once the product was selected a close relationship with the vendor was maintained to ensure that the deployment was successful. The vendor s profession services division was engaged to assist with the implementation. While we knew your systems and services, they knew their tool sets. Assign Plenty of Time. Collecting data from automated discovery tools is in itself a fairly quick and easy process. However, analysing the data and classifying discovered CIs and filtering out unwanted details takes time in planning and implementing. Identifying relationships between CIs and mapping them correctly to services is also a time consuming process. While tools can detect lines of communication through the infrastructure they cannot determine the relationship to the service provided. That requires manual effort and this too can take a considerable amount of time. However, once the initial mapping is complete it does not take too much resource to maintain the maps. 3
6 Stage 2 Implementation Avoid customisation. While the tools we deployed supported customisation, deviating from the tool s standards could complicate the various data mappings going forward. After determining what data was required an analysis of how this data related to the tool s data model was carried out. This analysis determined that our requirements would fit into the data model provided by the tools. Our recommendation is that if customisation cannot be avoided then ensure that it is kept to a minimum. It is a lot easier to maintain an out of the box solution. Test and Verify. During the implementation of the discovery tools it was quickly identified that a staged approach was required to ensure that data verification could be carried out easily and quickly. Discovering a specific CI category and correcting anomalies before progressing on to the next stage of discovery ensured that the collected data was accurate. Trying to validate the data collected from a single pass of our entire estate would have been difficult and time consuming. After collecting the data the reconciliation into the CMDB had to be tested. When multiple data sources are being used it is crucial that the correct order and priorities are assigned. Also, the reconciliation of data requires careful consideration regarding the unique key field on which data can be reconciled. At first serial numbers seemed to be the obvious choice, but it soon became apparent that this provided its own difficulties. In today s climate of virtualisation, several systems can have the same serial number thus negating the uniqueness of this attribute as a key field! Security Discovery tools require a high level of access to computer systems in order to collect the greatest amount of data and as such they can prove to be a security threat. The security of computer systems in any industry, not just the financial sector, is paramount and it was of great importance that we ensure no vulnerabilities were introduced. User account administration introduces its own problems maintaining restricted access and forced password changing policies. Collaboration with security administrators was undertaken in order to provide the best practical and compliant solution for our environment. Capacity There were two new discovery tools being deployed as part of this project. One would reside on a central system and would interrogate the network for attached devices while the other required the installation of a small program on each computer system that would interrogate its host and then send back data to a central administration system. While the latter could potentially impact service by using the resource of the hosting system, both of these tools would have an impact on our network traffic and therefore could potentially impact our business service. Collaboration with our network administration and capacity management teams, and execution of a series of test discoveries allowed us to show that, in both cases, the impact to existing services was negligible and the project could proceed. 4
7 Promotion to Production. At the conclusion of the project we had three new production systems. Two systems automatically discovered our IT infrastructure and recorded the results in their own, separate CMDBs, while the third system provided us with an integrated CMDB. Data from the two discovery CMDBs was being reconciled into the integrated CMDB along with data from two other manually maintained data sources. The integrated CMDB provides data that can be used to map technology to services, providing up-to-date views of relationships between the service and the CIs on which it depends. CIs can support multiple services and these relationships are also held in the integrated CMDB. This data is readily available, giving us our single source of truth. Expectations Now that the automated discovery tools and integrated CMDB have been deployed it is expected that the data will be used to assist change, problem and incident management processes. Change: Better understanding of change overlap Improve risk assessment Assist change owner in understanding dependencies Problem: Simplify association of CIs with Services Improved root cause analysis investigation Reduction in reoccurrences Incident: Improved view of overall service Improved impact analysis Aid to rapid recovery As our services become ever more complex the task of managing them becomes increasingly difficult. A failure of a single component may on the surface look quite innocuous but the knock on effect down stream could potentially be disastrous. The automated discovery and integrated CMDB give a complete end-to-end view of our services and CIs, in both directions (from a service to CI relationship and a CI to service relationship). There will not be any more surprises. If a CI is impacted it is easy to determine the services impacted. All of these improvements ultimately improve the levels of service delivered. 5
8 Conclusion. While the automation of discovery and the implementation of an integrated CMDB has resulted in an improved CMS this is not the end of the story. Our secondary goal was to lay the foundation on which we could build our CMS and I believe that we have achieved this also. There are still multiple CMDBs in use within NAG, and I am sure that this will always be the case. However, there is less reliance on manual processes, and the implementation of an integrated CMDB will allow us to reconcile the data from all of our CMDBs. It is our intention that key information taken from disparate CMDBs will be reconciled into the integrated CMDB while more detailed data will remain in the relevant CMDB. Users will make requests of the integrated CMDB and where more detail is required they can gain access to it through automated federation processes. Manual processes have not disappeared entirely as there is a limit to what data automated discovery tools can collect. Physical location, for example, is an attribute of a physical CI that, unless the CIs are electronically tagged, cannot be automatically generated. A recent data centre migration had carried out an extensive audit of one of our data centres. This audit provided valuable data in regard to machine locations. Although this data is manually maintained, the migration has ensured that the data is correct and a new management process will ensure that its accuracy is maintained. This process will in the coming months be rolled out into our other data centre which will result in an accurate database of all machine locations. This data too, will be reconciled into our integrated CMDB. The implementation of our integrated CMDB is not the end of our journey, just the beginning. While in its current guise the integrated CMDB provides benefit to other ITIL processes, the full potential can only be realised once the supporting systems for these processes are also integrated. Asset, Change, Problem and Incident systems will in due course be fully integrated, turning our integrated CMDB into an integrated CMS. 6
Integration Technologies Group (ITG) ITIL V3 Service Asset and Configuration Management Assessment Robert R. Vespe Page 1 of 19
Service Asset and Configuration 1. Does the tool facilitate the registration and management of an organization s logical, physical and virtual Configuration Items (CIs)? For example, services, systems,
The CMDB: The Brain Behind IT Business Value
Thought Leadership white paper The CMDB: The Brain Behind IT Business Value By Gerry Roy, Director of Solutions Management for BMC Atrium and BMC Service Support, BMC Software TABLE OF CONTENTS Executive
IT Asset Inventory and Outsourcing: The Value of Visibility
BDNA WHITE PAPER IT Asset Inventory and Outsourcing: The Value of Visibility October 2007 bdnacorp.com U.S. Corporate Headquarters 650.625.9530 Europe, Middle East & Africa +33.1.42.27.10.71 Asia Pacific
Service Support. 2005 Kasse Initiatives, LLC. ITIL Configuration Management - 1. version 2.0
Service Support Configuration Management ITIL Configuration Management - 1 Goals of Configuration Management The goals of Configuration Management are to: Account for all the IT assets and configurations
What Do You Need from a Configuration Management Database (CMDB)? BEST PRACTICES WHITE PAPER
What Do You Need from a Configuration Management Database (CMDB)? BEST PRACTICES WHITE PAPER Table of contents EXECUTIVE SUMMARY...1 WHY A CMDB?...2 The importance of configuration management...2 Goals...2
ITIL A guide to service asset and configuration management
ITIL A guide to service asset and configuration management The goal of service asset and configuration management The goals of configuration management are to: Support many of the ITIL processes by providing
GENERAL PLATFORM CRITERIA. General Platform Criterion Assessment Question
GENERAL PLATFORM CRITERIA SACM-V3-G-001 Comment: Does the tool use ITIL V3 process terms and align to ITIL V3 workflows and process integrations? SACM-V3-G-002 (OGC ISS 5.1.10) Access Controls Does the
General Platform Criterion Assessment Question
Purpose: [E]nsure that the assets required to deliver services are properly controlled, and that accurate and reliable information about those assets is available when and where it is needed. (ST 4.3.1)
The CMDB at the Center of the Universe
The CMDB at the Center of the Universe Reg Harbeck CA Wednesday, February 27 Session 5331 Purpose Clarify origin of CMDB concept and what it is Understand difference and equivalence between CMDB and Asset
Service Asset & Configuration Management PinkVERIFY
-11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to
ITSM Maturity Model. 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident management process exists
Incident ITSM Maturity Model 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident process exists Incident policies governing incident Incident urgency, impact and priority
How to Deliver Measurable Business Value with the Enterprise CMDB
How to Deliver Measurable Business Value with the Enterprise CMDB James Moore [email protected] Product Manager, Business Service, Netcool/Impact 2010 IBM Corporation Agenda What is a CMDB? What are CMDB
Simple Service Modeling FAQs TrueSight Operations Management (BPPM) versions 9.5 and 9.6 11/31/2014
QUESTION: Where on the BMC Communities site can I find best practice guidance for creating custom KMs and importing them into BPPM 9.5 CMA? ANSWER: https://communities.bmc.com/docs/doc-31482 QUESTION:
Select the right configuration management database to establish a platform for effective service management.
Service management solutions Buyer s guide: purchasing criteria Select the right configuration management database to establish a platform for effective service management. All business activities rely
Software Asset Management (SAM) and ITIL Service Management - together driving efficiency
Software Asset Management (SAM) and ITIL Service Management - together driving efficiency Ian Preskett MIET C.Eng. MBCS CITP Software Asset Management Consultant [email protected] Agenda
7 Practical insights for IT Asset Management
7 Practical insights for IT Asset Management Tauneel McKay Director Swiss Reinsurance Company Ltd Subbarao Chaganty Principal Consultant Infosys Ltd RELATE MANAGE.. Context KNOW. Consolidate the IT Asset
White Paper November 2006. BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management
White Paper November 2006 BMC Best Practice Process Flows for Asset and ITIL Configuration Copyright 2006 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names,
Whitepaper. The Interlink Software Approach to. Service Configuration Management (SCM)
Whitepaper When the Only Constant is Change! The provision of a corporate-wide Configuration Management System (CMS) in a fortune 1000 organisation is not a trivial task, most organisations have grown
CA Configuration Management Database (CMDB)
PRODUCT BRIEF: CA CMDB CA Configuration Management Database (CMDB) CA CONFIGURATION MANAGEMENT DATABASE (CMDB) HELPS YOU IDENTIFY AND UNDERSTAND THE DEPENDENCIES AND RELATIONSHIPS AMONG AND BETWEEN YOUR
BIGFIX. BigFix and configuration management database solutions
BigFix and configuration management database solutions Configuration management databases (CMDB) have emerged as an important tool for understanding relationships between IT assets and their support for
Bringing wisdom to ITSM with the Service Knowledge Management System
Processes 415 Bringing wisdom to ITSM with the Service Knowledge Management System 7.3 Bringing wisdom to ITSM with the Service Knowledge Management System nowledge is a process of piling up facts; wisdom
8 Tips for Winning the IT Asset Management Challenge START
Tips for Winning the IT Asset Management Challenge START A successful IT Asset Management (ITAM) program can help you lower your costs and increase your asset utilization. You benefit by avoiding unplanned
Control Costs with a 4-Speed SACM Transmission
WHITE PAPER: Control Costs with a 4-Speed SACM Transmission Brent J. Knipfer Director ITSM Product Management CompuCom May 2012 Executive Summary IT executives are clamoring for more control over the physical
Rob Addy. Author of Effective IT Service Management: To ITIL and beyond! (www.effectiveitsm.com)
Rob Addy Author of Effective IT Service Management: To ITIL and beyond! (www.effectiveitsm.com) Are you sitting in the right session? Discover the truth about discovery Automated discovery was, and indeed
CA Service Desk Manager
PRODUCT BRIEF: CA SERVICE DESK MANAGER CA Service Desk Manager CA SERVICE DESK MANAGER IS A VERSATILE, COMPREHENSIVE IT SUPPORT SOLUTION THAT HELPS YOU BUILD SUPERIOR INCIDENT AND PROBLEM MANAGEMENT PROCESSES
The ITIL Foundation Examination
The ITIL Foundation Examination Sample Paper B, version 4.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have
Problem Management Fermilab Process and Procedure
Management Fermilab Process and Procedure Prepared for: Fermi National Laboratory June 12, 2009 Page 1 of 42 GENERAL Description Purpose Applicable to Supersedes This document establishes a Management
SACM and CMDB Strategy and Roadmap. David Lowe ActionableITSM.com March 20, 2012
SACM and CMDB Strategy and Roadmap David Lowe ActionableITSM.com March 20, 2012 Disclaimer The strategy and roadmap information presented here is generic by nature and based on a highly hypothetical use
Extend the value of your service desk and integrate ITIL processes with IBM Tivoli Change and Configuration Management Database.
IBM Service Management solutions and the service desk White paper Extend the value of your service desk and integrate ITIL processes with IBM Tivoli Change and Configuration Management Database. December
Which ITIL process or function deals with issues and questions about the use of services, raised by end users?
1 of 40 Which ITIL process or function deals with issues and questions about the use of services, raised by end users? A. Availability Management B. Service Level Management C. Problem Management D. Service
EXIN IT Service Management Foundation based on ISO/IEC 20000
Sample Exam EXIN IT Service Management Foundation Edition October 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
How To Monitor Hybrid It From A Hybrid Environment
IT Monitoring for the Hybrid Enterprise With a Look at ScienceLogic Perspective 2012 Neovise, LLC. All Rights Reserved. Report Published April, 2015 Hybrid IT Goes Mainstream Enterprises everywhere are
How to make auto-discovery work; a dynamic data-driven alternative to the periodic trawl of Discovery and Dependency Mapping (DDM)
How to make auto-discovery work; a dynamic data-driven alternative to the periodic trawl of Discovery and Dependency Mapping (DDM) Look what people are saying, source Linkedin IT Service Management Forum:
Configuration control ensures that any changes to CIs are authorized and implemented in a controlled manner.
ITIL Intermediate Capability Stream: RELEASE CONTROL AND VALIDATION (RCV) CERTIFICATE SCENARIO BOOKLET Scenario One A global company develops its own applications to support the business. The service transition
ITIL Intermediate Capability Stream:
ITIL Intermediate Capability Stream: RELEASE, CONTROL AND VALIDATION (RCV) CERTIFICATE Sample Paper 1, version 5.1 Gradient Style, Complex Multiple Choice QUESTION BOOKLET Gradient Style Multiple Choice
White Paper. Incident Management: A CA IT Service Management Process Map
White Paper Incident Management: A CA IT Service Management Process Map Peter Doherty Senior Consultant, Technical Service, CA, Inc. Peter Waterhouse Director, Product Marketing, Business Service Optimization,
CMDB Essential to Service Management Strategy. All rights reserved 2007
CMDB: Essential to the Service Management strategy Business Proposition: This white paper describes how the CMDB is an essential component of the IT Service Management Strategy, and why the FrontRange
The ITIL Foundation Examination
The ITIL Foundation Examination Sample Paper A, version 5.1 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have
NSSC Enterprise Service Desk Configuration Management Database (CMDB) Configuration Management Service Delivery Guide
National Aeronautics and Space Administration NASA Shared Services Center Stennis Space Center, MS 39529-6000 www.nssc.nasa.gov NASA Shared Services Center Version 1.0 NSSC Enterprise Service Desk Configuration
Problem Management: A CA Service Management Process Map
TECHNOLOGY BRIEF: PROBLEM MANAGEMENT Problem : A CA Service Process Map MARCH 2009 Randal Locke DIRECTOR, TECHNICAL SALES ITIL SERVICE MANAGER Table of Contents Executive Summary 1 SECTION 1: CHALLENGE
CONFIGURATION MANAGEMENT BEST-PRACTICE RECOMMENDATIONS. Sun Services White Paper May 2007. Abstract
BEST-PRACTICE RECOMMENDATIONS CONFIGURATION MANAGEMENT Sun Services White Paper May 2007 Abstract Modern IT organizations can have hundreds or thousands of servers supporting business users around the
Service Catalog Management: A CA Service Management Process Map
TECHNOLOGY BRIEF: SERVICE CATALOG MANAGEMENT Catalog : A CA Process Map JULY 2009 Enrico Boverino SR PRINCIPAL CONSULTANT, TECHNICAL SALES ITIL SERVICE MANAGER ITAC CERTIFIED Table of Contents Executive
Asset management guidelines
Asset management guidelines 1 IT asset management (ITAM) overview Objective Provide a single, integrated view of agency assets in order to allow agencies to identify the asset location and assess the potential
SOLUTION WHITE PAPER. Align Change and Incident Management with Business Priorities
SOLUTION WHITE PAPER Align Change and Incident Management with Business Priorities Table of Contents Executive summary 1 the Need for Business aware Service support processes 2 The Challenge of Traditional
CA CMDB Connector for z/os version 2.0
PRODUCT SHEET CA CMDB Connector for z/os version 2.0 CA CMDB Connector for z/os version 2.0 CA CMDB Connector for z/os is the final piece in the puzzle to create an enterprise CMDB, providing you the ability
Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER
Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER CONTENTS ADAPTING TO THE CONSTANTLY CHANGING ENVIRONMENT....................... 1 THE FOUR KEY BENEFITS OF AUTOMATION..................................
ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE
ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE CONFIGURATION MANAGEMENT PACK FEATURES Automated discovery of dependency relationships between services, systems and Oracle
ITIL Roles Descriptions
ITIL Roles s Role Process Liaison Incident Analyst Operations Assurance Analyst Infrastructure Solution Architect Problem Manager Problem Owner Change Manager Change Owner CAB Member Release Analyst Test
BUYER S GUIDE: PC INVENTORY AND SOFTWARE USAGE METERING TOOLS
BUYER S GUIDE: PC INVENTORY AND SOFTWARE USAGE METERING TOOLS A guide for identifying an IT/software asset management product that best meets the needs of your organization 200 West Mercer Street Suite
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Next-Generation IT Asset Management: Transform IT with Data-Driven ITAM
Sponsored by Next-Generation IT Asset Management: In This Paper IT Asset Management, one of the key pillars of IT, is currently highly siloed from related and dependent functions Next-generation ITAM provides
Exam : EX0-100. Title : ITIL Foundation Certificate in IT Service Management. Ver : 08.01.06
Exam : EX0-100 Title : ITIL Foundation Certificate in IT Service Management Ver : 08.01.06 QUESTION 1 The successful diagnosis of a problem results in a Known Error. On the basis of this Known Error a
IBM Maximo Asset Management for IT
Cost-effectively manage the entire life cycle of your IT assets IBM Highlights Help control the costs and financial impact of IT assets with a single solution that tracks and manages your hardware, software
Network Configuration Management
Network Configuration Management Contents Abstract Best Practices for Configuration Management What is Configuration Management? FCAPS Configuration Management Operational Issues IT Infrastructure Library
Deploying the CMDB for Change & Configuration Management
WHITE PAPER: CMDB, CHANGE & CONFIGURATION MANAGEMENT Deploying the CMDB for Change & Configuration Management MAY 2007 CA and BearingPoint Table of Contents Executive Summary SECTION 1 2 Pressures on IT
CMDB Federation. DMTF Standards for Federating CMDBs and other Management Data Repositories
CMDB Federation DMTF Standards for Federating CMDBs and other Management Data Repositories Synopsis Many organizations base IT management on a configuration management system consisting of a configuration
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations
Achieving Control: The Four Critical Success Factors of Change Management Technology Concepts & Business Considerations T e c h n i c a l W H I T E P A P E R Table of Contents Executive Summary...........................................................
Release & Deployment Management
1. Does the tool facilitate the management of the full lifecycle of Release and Deployment Management? For example, planning, building, testing, quality assurance, scheduling and deployment? Comments:
CA Service Desk Manager
DATA SHEET CA Service Desk Manager CA Service Desk Manager (CA SDM), on-premise or on-demand, is designed to help you prevent service disruptions, better manage change risks, and provides a 360-degree
Configuration Management System:
True Knowledge of IT infrastructure Part of the SunView Software White Paper Series: Service Catalog Service Desk Change Management Configuration Management 1 Contents Executive Summary... 1 Challenges
White Paper: AlfaPeople ITSM 2013. This whitepaper discusses how ITIL 3.0 can benefit your business.
White Paper: AlfaPeople ITSM 2013 This whitepaper discusses how ITIL 3.0 can benefit your business. Executive Summary Imagine trying to run a manufacturing business without a comprehensive and detailed
Release and Deployment Management: A CA Service Management Process Map
TECHNOLOGY BRIEF: RELEASE AND DEPLOYMENT MANAGEMENT Release and Deployment : A CA Service Process Map JULY 2009 Malcolm Ryder ARCHITECT CA SERVICES Table of Contents Executive Summary 1 SECTION 1: CHALLENGE
BSM Transformation through CMDB Deployment. Streamlining the Integration of Change and Release Management
BSM Transformation through CMDB Deployment Streamlining the Integration of Change and Release Management Gordon Owens, Managing Consultant generatione Technologies Agenda Brief Introduction Building Blocks
N(i) 2 WHITE PAPER on CHANGE MANAGEMENT
on CHANGE MANAGEMENT ABOUT THIS... 2 IT AND CHANGE MANAGEMENT... 3 RESPONDING TO PERFORMANCE AND ACCOUNTABILITY DEMANDS...3 AN EMERGING NEED FOR CHANGE MANAGEMENT...3 DEFINING CHANGE MANAGEMENT... 4 WHAT
Management (CSM) Capability
CDM Configuration Settings Management (CSM) Capability Department of Homeland Security National Cyber Security Division Federal Network Security Network & Infrastructure Security Table of Contents 1 PURPOSE
Cisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
Why you need an Automated Asset Management Solution
solution white paper Why you need an Automated Asset Management Solution By Nicolas Renard, Support and Professional Services Manager, BMC France Table of Contents 1 OVERVIEW Automated Asset Discovery
ITIL V3 - Managing Application and Infrastructure Changes
ITIL V3: Managing Application and Infrastructure Changes > White paper Preface IT service providers need to offer services that deliver new business opportunities whilst increasing levels of availability,
HP Change Configuration and Release Management (CCRM) Solution
HP Change Configuration and Release Management (CCRM) Solution HP Service Manager, HP Release Control, and HP Universal CMDB For the Windows Operating System Software Version: 9.30 Concept Guide Document
Firewall Change Management
White Paper 2010 Firewall Change Management Improve IT Efficiency by Automating Firewall Change Workflow Processes w w w.sk yboxsecurity.com Executive Summary Firewall management has become a hot topic
Improving Service Asset and Configuration Management with CA Process Maps
TECHNOLOGY BRIEF: SERVICE ASSET AND CONFIGURATION MANAGEMENT MAPS Improving Service Asset and Configuration with CA Process Maps Peter Doherty CA TECHNICAL SALES Table of Contents Executive Summary SECTION
IT Service Management Guiding Principles A Starter Set
White Paper IT Service Management Guiding s A Starter Set Overview Purpose This paper briefly describes the concept of using Guiding s when designing ITIL processes. It then presents a starter set of Guiding
WHITE PAPER. iet ITSM Enables Enhanced Service Management
iet ITSM Enables Enhanced Service Management iet ITSM Enables Enhanced Service Management Need for IT Service Management The focus within the vast majority of large and medium-size companies has shifted
Release and Deployment Management Software
( Bron: ITG, Integration Technologies Group; zie ook blz 13) (Service Transition) Release and Deployment Management Software 1. Does the tool facilitate the management of the full lifecycle of Release
ITIL V3 and ISO/IEC 20000
For IT Service Management ITIL V3 and ISO/IEC 20000 Jenny Dugmore and Sharon Taylor Alignment White Paper March 2008 ITIL V3 and ISO/IEC 20000 Background For some years the close relationship between ITIL
Enterprise ITSM software
Enterprise ITSM software About vfire vfire is an Enterprise level IT Service Management Software tool developed by Alemba. As the successor to VMware s Service Manager product (formerly infraenterprise),
Fermilab Computing Division Service Level Management Process & Procedures Document
BMC Software Consulting Services Fermilab Computing Division Process & Procedures Document Client: Fermilab Date : 07/07/2009 Version : 1.0 1. GENERAL Description Purpose Applicable to Supersedes This
Best Practices for Implementing Software Asset Management
Best Practices for Implementing Software Asset Management Table of Contents I. The Case for Software Asset Management (SAM)............................ 2 II. Laying the Groundwork for SAM............................................
Bocada White Paper Series: Improving Backup and Recovery Success with Bocada Enterprise. Benefits of Backup Policy Management
Bocada White Paper Series: Improving Backup and Recovery Success with Bocada Enterprise Why Policy Management Matters... 3 Data Protection Service Management: An Overview... 3 Policy Management s Role
D6.1: Service management tools implementation and maturity baseline assessment framework
D6.1: Service management tools implementation and maturity baseline assessment framework Deliverable Document ID Status Version Author(s) Due FedSM- D6.1 Final 1.1 Tomasz Szepieniec, All M10 (31 June 2013)
Mapping the Technical Dependencies of Information Assets
Mapping the Technical Dependencies of Information Assets This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital
Three Asset Lifecycle Management Fundamentals for Optimizing Cloud and Hybrid Environments
Three Asset Lifecycle Management Fundamentals for Optimizing Cloud and Hybrid Environments An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for BMC April 2011 IT & DATA MANAGEMENT RESEARCH,
Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER
Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER Regulatory compliance. Server virtualization. IT Service Management. Business Service Management. Business Continuity planning.
Finding, Fixing and Preventing Data Quality Issues in Financial Institutions Today
Finding, Fixing and Preventing Data Quality Issues in Financial Institutions Today FIS Consulting Services 800.822.6758 Introduction Without consistent and reliable data, accurate reporting and sound decision-making
Self-Service SOX Auditing With S3 Control
Self-Service SOX Auditing With S3 Control The Sarbanes-Oxley Act (SOX), passed by the US Congress in 2002, represents a fundamental shift in corporate governance norms. As corporations come to terms with
CDM Hardware Asset Management (HWAM) Capability
CDM Hardware Asset Management (HWAM) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Table of Contents 1 PURPOSE AND SCOPE... 2 2 THREAT
BMC Remedyforce Asset Management. Frequently Asked Questions
BMC Remedyforce Frequently Asked Questions Table of Contents BMC Remedyforce 2 Overview 2 Frequently Asked Questions 2 Definitions 2 1. What is Configuration Management? 2 2. What is IT? 2 3. What is a
ARE YOU IMPLEMENTING A CMDB OR A PROCESS?
ARE YOU IMPLEMENTING A CMDB OR A PROCESS? Author : Gary Case, Principal Consultant, Pink Elephant Version : 1.0 Date : January 2010 1 EXECUTIVE SUMMARY Yeah! We are getting a Configuration Management Database
The ITIL Foundation Examination
The ITIL Foundation Examination Sample Paper A, version 4.2 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have
Creating and Maturing a Service Catalog
Creating and Maturing a Service Catalog By Wendy Kuhn and Pam Erskine Third Sky, Inc. Introduction Developing a service catalog can seem like a simple marketing and communications activity or a daunting
Automated Firewall Change Management. Ensure continuous compliance and reduce risk with secure change management workflows
Automated Firewall Change Management Ensure continuous compliance and reduce risk with secure change management workflows JANUARY 2015 Executive Summary Firewall management has become a hot topic among
SEAMLESS DATA PUMP. Out-of-the-box, and across the cloud, real-time secure data and event level integration
SEAMLESS DATA PUMP Out-of-the-box, and across the cloud, real-time secure data and event level integration Seamless Technologies data pumps accelerate new or existing CMDB / CMS deployments and reduce
